Twenty Year Anniversary

WordPress NextGEN Gallery 2.1.10 Shell Upload

WordPress NextGEN Gallery 2.1.10 Shell Upload
Posted Dec 23, 2015
Authored by CSW Research Lab

WordPress NextGEN Gallery plugin version 2.1.10 suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell, file upload
MD5 | d1d6f2b7a68ea003664f05d4a9eb51be

WordPress NextGEN Gallery 2.1.10 Shell Upload

Change Mirror Download
Hi,

Details
================
# Title : Malicious File Upload in NextGEN Gallery by Photocrati Version
2.1.10
# Affected Product : NextGEN Gallery by Photocrati Version 2.1.10
# Vendor Homepage: https://wordpress.org/plugins/nextgen-gallery/download/
# Vulnerability Type : Malicious File upload
# Risk : High
# POC URL :
https://github.com/cybersecurityworks/Disclosed/issues/6
# Video URL : https://www.youtube.com/watch?v=hMMG42HsgUA&feature=youtu.be
# Status : Fixed
# CVE-Assigned : No

Description
================
Even though credentials are required to upload file into the server. any
new combined vulnerability can allow an attacker to Upload shell into the
server which gives entire root access of the server.

Technical Details
================

1. Logon into any wordpress application (localhost or public host)
2. Move on to Next Gen Gallery plugin file upload option available on
products.
3. Upload JPG file to the server through file upload option.
4. Modify the file variable contains JPG extension to PHP. Also, edit
and add shell content to the name variable body containing JPG
information/content.

Advisory Timeline
================
2015-09-04 – Discovered in NextGen Gallery 2.1.10 version.
2015-09-04 – Reported to plugins@wordpress.org
2015-09-04 – Vendor responded in the same.
2015-09-09 – Fixed in NextGen Gallery 2.1.15 version.
2015-10-27 – CVE Requested

Fix
================
https://www.owasp.org/index.php/Unrestricted_File_Upload

Credits & Authors
================
sathish@cybersecurityworks.com from cybersecurityworks Pvt Ltd

About Cybersecurityworks
================
Cybersecurity Works is basically an auditing company passionate working on
findings & reporting security flaws & vulnerabilities on web application
and network. As professionals, we handle each client differently based on
their unique requirements. Visit our website
http://www.cybersecurityworks.com/ for more information.

--
----------
Cheers !!!

Team CSW Research Lab <http://www.cybersecurityworks.com>

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    12 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close